Skip to content

Commit 6af3bd5

Browse files
authored
Update overview-plan.md
1 parent 8412783 commit 6af3bd5

File tree

1 file changed

+24
-7
lines changed

1 file changed

+24
-7
lines changed

unified-secops-platform/overview-plan.md

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -90,15 +90,32 @@ Microsoft's unified SecOps platform ingests data from first-party Microsoft serv
9090

9191
Determine the full set of data sources you'll be ingesting data from, and the data size requirements to help you accurately project your deployment's budget and timeline. You might determine this information during your business use case review, or by evaluating a current SIEM that you already have in place. If you already have a SIEM in place, analyze your data to understand which data sources provide the most value and should be ingested into Microsoft Sentinel.
9292

93-
For more information, see [Prioritize data connectors](/azure/sentinel/prioritize-data-connectors).
94-
9593
For example, you might want to use any of the following recommended data sources:
9694

97-
|Scenario |Data sources |
98-
|---------|---------|
99-
|**Azure services** | If any of the following services are deployed in Azure, use the following connectors to send these resources' Diagnostic Logs to Microsoft Sentinel: <br><br> - **Azure Firewall** <br>- **Azure Application Gateway** <br>- **Keyvault**<br> - **Azure Kubernetes Service**<br> - **Azure SQL**<br>- **Network Security Groups**<br> - **Azure-Arc Servers** <br><br>We recommend that you set up Azure Policy to require that their logs be forwarded to the underlying Log Analytics workspace. For more on information, see [Create diagnostic settings at scale using Azure Policy](/azure/azure-monitor/essentials/diagnostic-settings-policy). |
100-
|**Virtual machines** | For virtual machines hosted on-premises or in other clouds that require their logs collected, use the following data connectors: <br><br> - **Windows Security Events using AMA**<br> - Events via **Defender for Endpoint** (for server)<br>- **Syslog** |
101-
|**Network virtual appliances / on-premises sources** | For network virtual appliances or other on-premises sources that generate Common Event Format (CEF) or SYSLOG logs, use the following data connectors: <br><br>- **Syslog via AMA** <br>- **Common Event Format (CEF) via AMA** <br><br> For more information, see [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](/azure/sentinel/connect-cef-syslog-ama?branch=main&tabs=single%2Ccef%2Cportal). |
95+
- **Azure services**: If any of the following services are deployed in Azure, use the following connectors to send these resources' Diagnostic Logs to Microsoft Sentinel:
96+
97+
- **Azure Firewall**
98+
- **Azure Application Gateway**
99+
- **Keyvault**
100+
- **Azure Kubernetes Service**
101+
- **Azure SQL**
102+
- **Network Security Groups**
103+
- **Azure-Arc Servers**
104+
105+
We recommend that you set up Azure Policy to require that their logs be forwarded to the underlying Log Analytics workspace. For more information, see [Create diagnostic settings at scale using Azure Policy](/azure/azure-monitor/essentials/diagnostic-settings-policy).
106+
107+
- **Virtual machines**: For virtual machines hosted on-premises or in other clouds that require their logs collected, use the following data connectors:
108+
109+
- **Windows Security Events using AMA**
110+
- Events via **Defender for Endpoint** (for server)
111+
- **Syslog**
112+
113+
- **Network virtual appliances / on-premises sources**: For network virtual appliances or other on-premises sources that generate [Common Event Format (CEF) or SYSLOG logs](/azure/sentinel/connect-cef-syslog-ama?branch=main&tabs=single%2Ccef%2Cportal), use the following data connectors:
114+
115+
- **Syslog via AMA**
116+
- **Common Event Format (CEF) via AMA**
117+
118+
For more information, see [Prioritize data connectors](/azure/sentinel/prioritize-data-connectors).
102119

103120
### Plan your budget
104121

0 commit comments

Comments
 (0)